International security 14 (KCNS)

12345678910
Across
  1. 7. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. 8. It is the process of validating a cryptocurrency transaction.
  3. 10. The programs and other operating information used by a computer.
Down
  1. 1. Using, requiring, or involved in high technology or short for high technology.
  2. 2. Criminal activities carried out by means of computers or the internet.
  3. 3. An arrangement of intersecting horizontal and vertical lines.
  4. 4. The state of being connected or interconnected.
  5. 5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. 6. A cryptocurrency, a virtual currency or a digital currency.
  7. 9. Wrongful or criminal deception intended to result in financial or personal gain.